The @ionicmoney exploit on @modenetwork is yet another reminder of why protocols need robust, well-structured security processes.
A great example is @aave’s “Onion Security” strategy, which includes multiple defense layers, including security processes enforced by top teams like @bgdlabs, Certora, @chaoslabs, @karpatkey, @Token_Logic, and @AaveChan.